This week, a serious software vulnerability, which rapidly became known as the ‘Bash Bug’ or ‘Shellshock’ dominated the headlines, as two other faked news stories showed that hoaxes can fool the world very easily these days.
Medical information is now worth up to 10 times the price of credit card details on online black markets, due to weak healthcare security and a thriving black market in data to be used for medical fraud.
Auction site eBay has remained defiant about ‘active’ listings ,containing computer code, despite multiple reports indicating that these are being used for phishing attacks.
In what appears to be a misogynist attack directed at Harry Potter actress Emma Watson, a site has appeared supposedly offering a countdown until images of her are released online.
Home Depot says it was hacked to the tune of 56 million payment cards. What is behind the current wave of cybercrime? This recorded presentation offers answers and some defensive strategies for organizations at risk.
Home Depot staff repeatedly ignored the concerns of employees about the security of its systems, prior to the Home Depot data breach, now thought to be the largest in history.
This week offered a lesson in how cybercriminals follow the news, and time their attacks to dupe the unwary – with several different attacks aimed at iPhone fans, in the week where Apple unveiled its iPhone 6.
This Thursday, September 18, is the biggest day in Scottish political history, as the country votes on whether it should become independent from the United Kingdom – but an ESET security expert has warned cybercriminals could strike.
Gamers have reported losing millions of dollars to hackers running customised ‘Grand Theft Auto V’ software which allows them to steal weapons, loot money, and even make people blow up in their own apartments.
This week, American chain Home Depot admitted its systems had been breached, Gmail users got a fright, and a series of videos showed leaks in Android chat apps. Meanwhile, Facebook freaked out the world…. again.
Three weeks ago, iSIGHT Partners discovered a new Ransomware encrypting victims’ documents. They dubbed this new threat TorrentLocker. TorrentLocker propagates via spam messages containing a link to a phishing page where the user is asked to download and execute “package tracking information”. In August, only Australians were targeted with fake Australian Post package-tracking page. While
Shoppers at Home Depot stores may have had their credit card details leaked online, after a massive batch of card information went on sale on a criminal internet site this week – and veteran security reporter Brian Krebs warns it may be the biggest leak yet.
As many as 18 top cybercrime experts from around the world will form a new Joint Cybercrime Action Task Force based in the Hague, which will target “top-level criminals”.
Gamers and cellphone users were targeted by criminal groups around the world this week – while retailers continued to suffer at the hands of POS malware, and a phishing campaign highlighted just how hot Bitcoin is right now.
The FBI has issued a warning to police and other emergency response personnel about a lethal new tool which ‘malicious actors’ have been using to deadly effect against American government institutions – Google dorks.
Sony’s PlayStation Network was back online and the information of its 53 million users safe, despite a weekend-long cyber attack, and a reported bomb threat which caused the diversion of a flight carrying a Sony executive.
This week saw two of the scariest targets for hacks ever – nuclear plants and city-wide traffic systems. Tthe traffic-light hack could basically have paralyzedany one of 40 American cities, and America’s Nuclear Regulatory Commission was successfully attacked three times within the past three years.
With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week – but revelations about FBI malware and a trove of a billion passwords inspired furious debate too.
Cybercriminals are waging a game of ‘cat and mouse’ with corporations, well-armed with malware protection AV software but facing adversaries who scan constantly for weak points, according to the first quarterly report released by the UK’s new Computer Emergency Response Team.